Cliengo – Chatbot Vulnerability (Medium) – CVE-2024-37923

Cliengo – Chatbot Vulnerability (Medium) – CVE-2024-37923

by | Apr 15, 2026 | Plugins

Attack Vectors

Cliengo – Chatbot (WordPress plugin slug: cliengo) versions up to and including 3.0.4 are affected by a Medium-severity Cross-Site Request Forgery (CSRF) vulnerability (CVE-2024-37923, CVSS 5.4).

CSRF attacks typically rely on social engineering: an attacker sends a crafted link or lures an administrator to a webpage that triggers a request in the background. If a logged-in WordPress administrator clicks the link (or loads the page) while authenticated, the request may be processed as if it was intentionally made by the admin.

In this case, the issue enables unauthenticated attackers to cause an unknown action to occur, provided they can trick a site administrator into interacting with attacker-controlled content (for example, clicking a link in an email, ad, chat message, or a spoofed internal request).

Security Weakness

The root cause is described as missing or incorrect nonce validation on an unknown function within the plugin. In WordPress, nonces are commonly used to confirm that a sensitive request (such as changing settings) is intentionally initiated by an authenticated user within the site’s admin interface.

When nonce validation is absent or implemented incorrectly, the site may accept state-changing requests that originate from outside the admin area. This undermines an important safeguard designed to prevent attackers from “piggybacking” on an admin’s active session.

Because the impacted function is described as unknown, organizations should treat this as a governance and risk issue: you may not be able to easily predict which administrative actions could be triggered until you patch and verify behavior in your environment.

Technical or Business Impacts

While the exact action an attacker could trigger is not specified, the practical business risk is that a successful CSRF event can cause unintended changes under an administrator’s authority. Even “limited” changes can create measurable downstream costs, including time spent diagnosing issues, restoring settings, and validating that customer-facing experiences remain trustworthy.

For marketing and revenue teams, any disruption to chatbot behavior or related site functionality could impact lead capture, customer experience, and campaign performance. For executives and compliance stakeholders, the risk includes operational disruption and the potential for misconfiguration-driven issues that are difficult to trace, because the initiating action may appear as a legitimate admin request.

Remediation: Update Cliengo – Chatbot to version 3.0.5 or newer as the patched release. Reference: Wordfence vulnerability advisory.

Similar Attacks

CSRF is a common web application weakness with a long track record of being used to change settings or trigger actions when an administrator is logged in. For context, here are a few credible references and examples that illustrate how CSRF has been used in real-world scenarios:

OWASP: Cross-Site Request Forgery (CSRF) explains typical CSRF patterns, including forced actions performed via a victim’s authenticated session.

PortSwigger Web Security Academy: CSRF provides real-world-style scenarios showing how attackers can exploit missing CSRF protections to perform unauthorized actions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers